print Print
Logo: Stiftung Secure Information and Communication Technologies SIC Stiftung Secure Information and Communication Technologies SIC

Proxy Tunnel

IAIK Proxy Tunnel is available for free. The Proxy Tunnel is an application based on IAIK JCE and iSaSiLk that makes it possible to add security features to existing applications and protocols without changing the underlying applications.

The Proxy Tunnel is an application based on IAIK JCE and iSaSiLk that makes it possible to add security features to existing applications and protocols without changing the underlying applications. It secures TCP connections over insecure networks by using SSL,which guarantees authentication, confidentiality, integrity and authorization. It is very flexible and user configurable.

Features:

  • Written purely in Java™ language, it can be used on any platform supporting JDK 1.1 or later.
  • Employs industry standard TLS v1 and SSL v3 encryption.
  • Independent of underlying applications and protocols, can be used e.g. for secure telnet.
  • Can be used to build a VPN.
  • Supports all SSL v3 cipher suites and can be used with RSA, DSA, DH for authentication and key agreement, DES, TripleDES, RC2 and RC4 for data encryption. Use of algorithms is fully user-configurable.
  • Can be used as an "SSL-amplifier" upgrading 40-bit security of exportable browsers to 128-bit security. Can be used to add HTTPS to any Web server as well.
  • Fully configurable trust settings.
  • Allows configurable access control based on IP addresses and/or client certificates.
  • Simple CA software included.

After registering, you can download and use the proxy-tunnel for free!

Acknowledgements

ICE-CAR

TELEMATICS for Research Initiative within the European TELEMATICS APPLICATIONS Programme (Research Sector, 1998-2000 Contracts, Project RE 4006) via the ICE-CAR project.


print Print